{"id":"https://openalex.org/W4392389647","doi":"https://doi.org/10.1109/isgt59692.2024.10454173","title":"False Data Injection Attacks Detection in Wide Area Damping Control System Using Semi-Supervised Generative Adversarial Network Model","display_name":"False Data Injection Attacks Detection in Wide Area Damping Control System Using Semi-Supervised Generative Adversarial Network Model","publication_year":2024,"publication_date":"2024-02-19","ids":{"openalex":"https://openalex.org/W4392389647","doi":"https://doi.org/10.1109/isgt59692.2024.10454173"},"language":"en","primary_location":{"id":"doi:10.1109/isgt59692.2024.10454173","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isgt59692.2024.10454173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Power &amp; Energy Society Innovative Smart Grid Technologies Conference (ISGT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047071969","display_name":"Abhishek Saini","orcid":null},"institutions":[{"id":"https://openalex.org/I4210152718","display_name":"Indian Institute of Technology Dharwad","ror":"https://ror.org/0509djg30","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210152718"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Abhishek Saini","raw_affiliation_strings":["IIT,Department of EECE,DHARWAD,India,580011"],"affiliations":[{"raw_affiliation_string":"IIT,Department of EECE,DHARWAD,India,580011","institution_ids":["https://openalex.org/I4210152718"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049246065","display_name":"Pratyasa Bhui","orcid":"https://orcid.org/0000-0002-8438-208X"},"institutions":[{"id":"https://openalex.org/I4210152718","display_name":"Indian Institute of Technology Dharwad","ror":"https://ror.org/0509djg30","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210152718"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pratyasa Bhui","raw_affiliation_strings":["IIT,Department of EECE,DHARWAD,India,580011"],"affiliations":[{"raw_affiliation_string":"IIT,Department of EECE,DHARWAD,India,580011","institution_ids":["https://openalex.org/I4210152718"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5047071969"],"corresponding_institution_ids":["https://openalex.org/I4210152718"],"apc_list":null,"apc_paid":null,"fwci":1.099,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76425331,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9465000033378601,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9465000033378601,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9362000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14225","display_name":"Advanced Sensor and Control Systems","score":0.9355000257492065,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8525298237800598},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6694766879081726},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.5816147923469543},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.56592857837677},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5268955230712891},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4709119498729706},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4617270529270172},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.45555979013442993},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.44856852293014526},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36219823360443115},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3228667974472046},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.18916332721710205},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.06663274765014648}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8525298237800598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6694766879081726},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.5816147923469543},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.56592857837677},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5268955230712891},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4709119498729706},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4617270529270172},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.45555979013442993},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.44856852293014526},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36219823360443115},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3228667974472046},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.18916332721710205},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.06663274765014648}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isgt59692.2024.10454173","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isgt59692.2024.10454173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Power &amp; Energy Society Innovative Smart Grid Technologies Conference (ISGT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1630959083","https://openalex.org/W2049488676","https://openalex.org/W2109044095","https://openalex.org/W2137346840","https://openalex.org/W2145376937","https://openalex.org/W2145616301","https://openalex.org/W2168048495","https://openalex.org/W2737720948","https://openalex.org/W2787417815","https://openalex.org/W2963373786","https://openalex.org/W3027815439","https://openalex.org/W3044239919","https://openalex.org/W3126446500","https://openalex.org/W4210698069","https://openalex.org/W4226333495","https://openalex.org/W4352980960","https://openalex.org/W6718379498","https://openalex.org/W6753914649"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4384648009","https://openalex.org/W4303645823","https://openalex.org/W2900159906","https://openalex.org/W4283221438","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W2899811703","https://openalex.org/W4385421777"],"abstract_inverted_index":{"The":[0,132,184],"drive":[1],"towards":[2],"digital":[3],"automation":[4],"of":[5,15,39,48,70,89,195],"the":[6,12,37,45,52,87,96,136,151,173,180,188,193,196],"power":[7,53,163,197],"grid":[8],"has":[9],"resulted":[10],"in":[11,95,123,168],"extensive":[13],"deployment":[14],"wide-area":[16,40],"measurement":[17],"system":[18,54,152,164],"(WAMS)":[19],"technology.":[20],"This":[21],"WAMS":[22],"technology":[23],"is":[24,114],"communication":[25,49],"network-based":[26],"and":[27,32,68,82,141,156,162],"responsible":[28],"for":[29,103,128,146],"transmitting":[30],"measurements":[31],"control":[33],"signals":[34],"to":[35,55],"enable":[36],"operation":[38],"damping":[41,137],"controllers":[42],"(WADC).":[43],"However,":[44],"inherent":[46],"vulnerability":[47],"networks":[50,121],"exposes":[51],"various":[56],"cyber":[57,105,199],"threats,":[58],"such":[59],"as":[60],"false":[61],"data":[62,93],"injection":[63],"(FDI)":[64],"attacks,":[65,67],"delay":[66],"denial":[69],"service":[71],"(DOS)":[72],"attacks.":[73,106],"Although":[74],"researchers":[75],"have":[76],"developed":[77],"numerous":[78],"supervised":[79],"machine":[80],"learning":[81,84],"deep":[83],"solutions,":[85],"but":[86],"unavailability":[88],"labeled":[90],"large":[91],"attack":[92,130,157],"sets":[94],"real":[97],"world":[98],"presents":[99],"a":[100,111],"significant":[101],"challenge":[102],"detecting":[104],"To":[107,171],"address":[108],"this":[109,169],"issue,":[110],"novel":[112],"approach":[113],"proposed":[115,133,174,189],"that":[116,187],"utilizes":[117],"semi-supervised":[118],"generative":[119],"adversarial":[120],"(SSGAN)":[122],"conjunction":[124],"with":[125],"physics-aware":[126],"features":[127,145],"FDI":[129,160],"detection.":[131],"framework":[134,190],"uses":[135],"torque":[138],"coefficient":[139],"(DTC)":[140],"mode":[142],"shape":[143],"(MS)":[144],"training,":[147],"which":[148],"accurately":[149],"captures":[150],"dynamics":[153],"during":[154],"event":[155],"scenarios.":[158],"Various":[159],"attacks":[161],"events":[165],"are":[166,177],"considered":[167],"study.":[170],"validate":[172],"method,":[175],"tests":[176],"conducted":[178],"using":[179],"4-machine":[181],"Kundur\u2019s":[182],"system.":[183],"results":[185],"demonstrate":[186],"significantly":[191],"enhances":[192],"cybersecurity":[194],"system\u2019s":[198],"layer.":[200]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
